The interaction is very cool. I love this set up.” “Searching for vendors products was very easy and quick.” “I could quickly move from booth to booth to look for new technology.”
Those are just some of the comments from past iSecurity virtual trade shows, a free online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at your fingertips.
Canaries can have a short but significant life in a coal mine. Significant because, in their traditional role, they were used to identify the dangerous and costly fumes known as methane and carbon monoxide which could cause the loss of the business of the mine, the brand of the mine owners, and the skilled human assets of their workers.
While the Security 500 report identifies the best programs, biggest investors and brightest leaders in 16 sectors, the fact remains that all of these organizations are inextricably entwined with smaller organizations across multiple supply chains.
In the October 2009 issue of Security, leadership columnist Lance Wright reminded us of several key leadership attributes that are universally sought by successful organizations in all sectors.
Security incidents can happen anywhere in the world at any time, as evidenced by last year’s Mumbai terrorist attacks and suicide bombings, tourists killed in Mexico and of course, the events of 9/11.
Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers. They change the security landscape for the better.
Forget Ipads, Facebook and even the latest video game, Call of Duty-Black Ops, which sold $300 million plus in its first day, as hot companies and can’t lose businesses. They have nothing on cyber crime. At the recent Security 500 Conference, Tom Mahlik, former Section Chief for the FBI’s Domain Section Counter Intelligence Division, pointed out that not only are U.S. businesses and government agencies losing north of one trillion dollars from cyber crime globally (yes, about 8 percent of the U.S. economy); but that most victims are not aware of it and do little to defend against it.
A security manager visiting a company manufacturing floor noticed a curtain hung around a work area. He asked if proprietary work was being done behind the curtain. “No,” he was told, “that’s just how we deal with Bill.” Bill had long, loud, demonstrative conversations with God while he worked on the floor, so they’d put up the curtain to shield the other employees from his disturbing behavior.
We recently conducted a poll on our Web site asking visitors the question, “What in your organization is putting your continued employment at greatest risk?” Eighteen percent of respondents said